Security news that informs and inspires

All Articles

1889 articles:

Decipher Podcast: Chris Wysopal and Cris Thomas

Chris Wysopal and Cris Thomas of the L0pht join Dennis Fisher to talk about the 25-year-anniversary of the group's landmark Senate testimony, what's changed since then, and Cris's new book, How the Hackers Known as L0pht Changed the World.


International Cooperation Key to Ransomware Fight

Top cybersecurity officials from the U.S., U.K., and other allies say international cooperation among intelligence and law enforcement agencies has been a key factor in successful operations against ransomware groups.

Rsa, Government, Ransomware

Mirai Botnet Attackers Exploit TP-Link Router Bug

Researchers began to detect exploit attempts in the wild targeting the patched, high-severity flaw in TP-Link routers starting on April 11.

Mirai, Malware, Exploit

Iranian Hackers Blocked After Gaining Access to 2020 Municipal Election Infrastructure

Government officials talked about how agencies have partnered to address election security, the SolarWinds cyberattack and the Hafnium threat group's exploitation of Exchange servers.

Rsac, Solarwinds, Election Security

New MacOS Malware Emerges in North Korean APT Attacks

A new macOS malware, called "RustBucket," is used in a multi-stage attack.

Lazarus, North Korea

Decipher Podcast: Source Code 4/21

Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.

Source Code, Podcast

Ransomware Groups Use New AuKill Tool to Slip Under the Radar

Ransomware actors are utilizing a tool that abuses an out-of-date Windows driver in order to kill security software.

Malware, Ransomware

Decipher Podcast: Casey Ellis Returns

Casey Ellis, founder and CTO of Bugcrowd, joins Dennis Fisher to discuss the newly formed Hacking Policy Council, the challenges of influencing security research policy and legislation, and what the council hopes to achieve.


Earlier Supply Chain Attack Led to 3CX Intrusion

An intrusion at a separate company led to the supply chain attack on 3CX that was disclosed last month, investigators said.

Supply Chain Security

Google Fixes Chrome Zero-Day Flaw

The Chrome flaw is the second zero-day bug in a week that Google has addressed.

Google, Google Chrome, Chromeos Security, Zero Day

GitHub Launches Private Bug Reporting, Package Provenance Features

GitHub is launching two new features that enable developers to create a private vulnerability reporting channel and provide provenance attestations for their packages.

Github, Supply Chain Security

Play Ransomware Attacks Utilize New Custom Tools

More ransomware groups are developing custom tools for data exfiltration, to deploy second-stage malware and more.

Malware, Ransomware

APT28 Exploiting Old Flaw to Install Jaguar Tooth Malware

The Russian APT28 group is exploiting a six-year-old vulnerability in some Cisco IOS and IOS XE router software to install malware known as Jaguar Tooth.

Malware, Russia

LockBit Ransomware Variant Targets MacOS

LockBit’s macOS ransomware version is in active development and currently poses no risk to Mac users, but security researchers are concerned about future ransomware threats to the macOS landscape.

Macos, Macos Security, Ransomware

Researchers Warn of Uptick in Qakbot Malware Attacks

Researchers warn of a "significant increase" in emails aiming to deliver the Qakbot malware.

Banking Malware, Phishing